October 2004
-
October 29, 2004
29
Oct'04
Home users threaten enterprises
Home users' lack of security knowledge is threatening enterprise and government networks, according to a new survey. Continue Reading
-
October 28, 2004
28
Oct'04
Week 45: Firewall security tips
When your organization's networks are connected to the Internet without adequate security measures, you are vulnerable to attack. Continue Reading
-
October 28, 2004
28
Oct'04
Threat management: Assessing patch rankings
Experts warn security managers not to take patch rankings at face value. Continue Reading
-
October 28, 2004
28
Oct'04
Zafi-C targets Google, Microsoft and Hungarian leader
Each new strain of the Zafi worm is more sophisticated and malicious than the last, according to one antivirus expert. Continue Reading
-
October 28, 2004
28
Oct'04
VoIP security, 'spit' concern experts
A rise in enterprises using VoIP technology has highlighted security and spam concerns. Continue Reading
-
October 27, 2004
27
Oct'04
Regulating information security
Ira discusses the benefits of regulating information security. Continue Reading
-
October 27, 2004
27
Oct'04
'Highly critical' flaw in RealPlayer, RealOne
An attacker could use a buffer overflow vulnerability in RealPlayer and RealOne Player to launch malicious code, but a fix is available. Continue Reading
-
October 27, 2004
27
Oct'04
The missing cybersecurity debate
IT practitioners say President George W. Bush and Sen. John F. Kerry have been unclear about their cybersecurity plans. Continue Reading
-
October 26, 2004
26
Oct'04
Use performance evaluations to strengthen your infosec staff
When resources are low you can't afford to carry dead weight. Use these evaluation best practices to keep your team lean and mean. Continue Reading
-
October 26, 2004
26
Oct'04
Understanding the 'hole' truth
Small and medium-sized businesses, especially those that team with big players, are leaving everyone vulnerable to attacks when flaws go unnoticed. There are some steps that SMBs can take to find their networks' weaknesses -- and fast. Continue Reading
-
October 26, 2004
26
Oct'04
Security Bytes: New worm variants plague e-mail; flaws found in Linux, Solaris
Famus-B uses Iraq war to spread, while Myflip claims to be from eBay. IBM announced new security index. Continue Reading
-
October 25, 2004
25
Oct'04
Check 21: A classic case of risk
Risk is all about trade-offs, in this case cost-effectiveness versus security. Continue Reading
-
October 25, 2004
25
Oct'04
Security Bytes: Google battens its hatch
Google fixes flaw in it's Desktop Search tool; multiple vendors announce flaws; Cisco acquires Perfigo. Continue Reading
-
October 25, 2004
25
Oct'04
Online fraud 101
Financial institutions concerned about online fraud and phishing can benefit from a crash course in Check 21 risk mitigation techniques and a few other pointers. Continue Reading
-
October 25, 2004
25
Oct'04
Virus targets Mac OS X users
Security experts say the Opener virus should serve as a warning that non-Microsoft users' machines aren't attack-proof. Continue Reading
-
October 25, 2004
25
Oct'04
Red Hat patch update a malicious hoax
Red Hat warned users to beware of bogus e-mails pretending to be an alert from its security team. Continue Reading
-
October 25, 2004
25
Oct'04
Check 21 becomes law
Implementation of the Check Clearing for the 21st Century Act begins Thursday and could open the door to mass consumer fraud. Continue Reading
-
October 25, 2004
25
Oct'04
How does the removal of WinPcap library impact malicious use of scanning software?
-
October 22, 2004
22
Oct'04
Spamming the universe
Already feel like you're drowning in a sea of spam? Experts predict it will only get worse, more than doubling by 2007. Continue Reading
-
October 21, 2004
21
Oct'04
Week 44: Permissions, part 2 -- Who owns what when?
Attackers can gain access to your system through files, directories and devices with higher privileges than necessary that execute on behalf of a privileged task. Continue Reading